header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpLinkat Cross Site Scripting Vulnerability

phpLinkat is prone to cross site scripting attacks. An attacker may exploit this vulnerability by enticing a victim user to follow a malicious link containing HTML and script code. The attacker-supplied HTML and script code may be executed on a web client in the context of the site hosting phpLinkat. Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.

phpMyNewsLetter File Include Vulnerability

It is possible to pass an attacker-specified file include location to a CGI paramter of the 'customize.php' script. This may allow an attacker to execute arbitrary commands with the privileges of the webserver. Additionally, an attacker may exploit this problem to view local webserver readable files.

Books Module Cross Site Scripting Vulnerability

Books is a module written for PostNuke. Reportedly, Books is prone to cross site scripting attacks. An attacker may exploit this vulnerability by enticing a victim user to follow a malicious link containing HTML and script code. The attacker-supplied HTML and script code may be executed on a web client in the context of the site hosting the vulnerable module. Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.

MySimpleNews PHP Code Injection Vulnerability

MySimpleNews allows users to enter news articles through a web interface. It will allow PHP code to be injected into URI parameters of the 'users.php' script, which will be stored into a MySimpleNews file (news.php3). The injected code may then be executed by the attacker by requesting the 'news.php3' script.

phpWebSite Cross-Site Scripting Vulnerability

phpWebSite is prone to cross-site scripting attacks. This vulnerability is due to insufficient sanitization of HTML tags from URI parameters processed by the 'article.php' script. As a result, an attacker may construct a malicious link to this script which contains arbitrary HTML and script code. When the malicious link is visited by a web user, the attacker-supplied code will be executed by their web client in the context of the site hosting the vulnerable software.

SurfControl SuperScout WebFilter Reports Server SQL Injection

SurfControl SuperScout WebFilter Reports Server is prone to SQL injection attacks due to insufficient input validation on the part of some of the reports files, which are implemented as .dlls. This allows remote attackers to modify the logic of SQL queries, potentially resulting in database corruption or disclosure of sensitive information.

SurfControl SuperScout WebFilter Reports Server Directory Traversal Vulnerability

SurfControl SuperScout WebFilter Reports Server is prone to a directory traversal vulnerability which allows an attacker to break out of the root directory for the reporting service and browse the filesystem at large, disclosing arbitrary files that are readable by the Reports Server.

Recent Exploits: